Abstract
The demands of a higher degree of security level for the mobile ad-hoc network are yet to meet the best solution. Owing to the dynamic topology and decentralization issue, the mobile node suffers from a consistent security problem during communication stage. This paper has reviewed the existing system towards secure routing in mobile ad-hoc network and explored that there are still a lot of scopes to enhance the security level. This paper presents a non-cryptographic technique called as JIR2TA or Joint Invocation of Resource-based Thresholding and Trust-oriented Authentication using resource and trust factor to intensify the routing policies for strengthening the authentication process of a mobile node. The outcome of the study shows better packet delivery ratio, computational time, throughput, and end-to-end delay in contrast to existing secure routing technique.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Jin, M., Du, Z.: Management innovation and information technology. WIT Trans. Inf. Commun. Technol. 61, 2124 (2014)
Sarkar, S.: Wireless Sensor and Ad Hoc Networks under Diversified Network Scenarios. Artech House, Boston (2012)
Loo, J., Mauri, J., Ortiz, J.: Mobile Ad Hoc Networks: Current Status and Future Trends. CRC Press, Inc., Boca Raton (2012). p. 538
Kennington, J., Olinick, E., Rajan, D.: Wireless Network Design. Springer, New York (2011)
Olanrewaju, R.F., Khan, B., Anwar, F., Shah, A.: Strategic profiling for behaviour visualization of malicious node in MANETs using Game Theory. J. Theor. Appl. Inf. Technol. 77(1), 25–43 (2015)
Amine, A., Ait Mohamed, O., Benatallah, B.: Network Security Technologies: Design and Applications. IGI Global, p. 330 (2013)
Pathan, A., Monowar, M., Fadlullah, Z.: Building Next-Generation Converged Networks: Theory and Practice. CRC Press, Boca Raton (2013)
Pathan, A.: Security of self-organizing networks: MANET, WSN, WMN, VANET. Auerbach Pub., Boca Raton (2011)
Khan, B., Olanrewaju, R., Habaebi, M.: Malicious behaviour of node and its significant security techniques in MANET-A review. Aust. J. Basic Appl. Sci. 7(12), 286–293 (2013)
Khan, B., Olanrewaju, R., Mir, R., Adebayo, B.: Behaviour visualization for malicious-attacker node collusion in MANET based on probabilistic approach. Am. J. Comput. Sci. Eng. 2(3), 10–19 (2015)
Marimuthu, M., Krishnamurthi, I.: Enhanced OLSR for defense against DOS attack in ad hoc networks. J. Commun. Netw. 15(1), 31–37 (2013)
Venkataraman, R., RamaRao, T., Pushpalatha, M.: Regression-based trust model for mobile ad hoc networks. IET Inf. Secur. 6(3), 131–140 (2012)
Lv, X., Li, H.: Secure group communication with both confidentiality and non-repudiation for mobile ad-hoc networks. IET Inf. Secur. 7(2), 61–66 (2013)
Zhang, P., Lin, C., Jiang, Y., Fan, Y., Shen, X.: A lightweight encryption scheme for network-coded mobile ad hoc networks. IEEE Trans. Parallel Distrib. Syst. 25(9), 2211–2221 (2014)
Zhao, S., Aggarwal, A., Frost, R., Bai, X.: A survey of applications of identity-based cryptography in mobile ad-hoc networks. IEEE Commun. Surv. Tutorials 14(2), 380–400 (2012)
Dhanapal, J., Srivatsa, S.: Link quality-based cache replacement technique in mobile ad hoc network. IET Inf. Secur. 7(4), 277–282 (2013)
Xi, S., Liang, S., Jianfeng, M., Zhuo, M.: A trust management scheme based on behavior feedback for opportunistic networks. China Commun. 12(4), 117–129 (2015)
Xia, H., Jia, Z., Li, X., Ju, L., Sha, E.: Trust prediction and trust-based source routing in mobile ad hoc networks. Ad Hoc Netw. 11(7), 2096–2114 (2013)
Tan, S., Li, X., Dong, Q.: Trust based routing mechanism for securing OSLR-based MANET. Ad Hoc Netw. 30, 84–98 (2015)
Wan, Z., Ren, K., Gu, M.: USOR: An unobservable secure on-demand routing protocol for mobile ad hoc networks. IEEE Trans. Wireless Commun. 11(5), 1922–1932 (2012)
Phu, P., Yi, M., Kim, M.: Securing AODV routing protocol in mobile ad-hoc networks. In: Active and Programmable Networks, vol. 4388, pp. 182–187. Springer, Heidelberg (2009)
Acknowledgments
This work was partially supported by Ministry of Higher Education Malaysia (Kementerian Pendidikan Tinggi) under Research Initiative Grant Scheme (RIGS) number RIGS 16-357-0521.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this paper
Cite this paper
Khan, B.U.I., Zulkurnain, N.F., Olanrewaju, R.F., Nissar, G., Baba, A.M., Lone, S.A. (2018). JIR2TA: Joint Invocation of Resource-Based Thresholding and Trust-Oriented Authentication in Mobile Adhoc Network. In: Bi, Y., Kapoor, S., Bhatia, R. (eds) Proceedings of SAI Intelligent Systems Conference (IntelliSys) 2016. IntelliSys 2016. Lecture Notes in Networks and Systems, vol 16. Springer, Cham. https://doi.org/10.1007/978-3-319-56991-8_50
Download citation
DOI: https://doi.org/10.1007/978-3-319-56991-8_50
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-56990-1
Online ISBN: 978-3-319-56991-8
eBook Packages: EngineeringEngineering (R0)